Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Which of the following attributes of data are cybersecurity controls primarily designed to protect?A . Veracity, velocity, and variety.B . Integrity, availability, and confidentiality.C . Accessibility, accuracy, and effectiveness.D . Authorization, logical access, and physical access.View AnswerAnswer: B
With regard to project management, which of the following statements about project crashing Is true?
With regard to project management, which of the following statements about project crashing Is true?A . It leads to an increase in risk and often results in rework.B . It is an optimization technique where activities are performed in parallel rather than sequentially.C . It involves a revaluation of project...
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?
Which of the following is an example of internal auditors applying data mining techniques for exploratory purposes?A . Internal auditors perform reconciliation procedures to support an external audit of financial reporting.B . Internal auditors perform a systems-focused analysis to review relevant controls.C . Internal auditors perform a risk assessment to...
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?
At what stage of project integration management would a project manager and project management team typically coordinate the various technical and organizational interfaces that exist in the project?A . Project plan development.B . Project plan executionC . Integrated change control.D . Project quality planningView AnswerAnswer: B
Which of the following is the ideal solution for management in this scenario?
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in...
Which of the following best describes a potential benefit of using data analyses?
Which of the following best describes a potential benefit of using data analyses?A . It easily aligns with existing internal audit competencies to reduce expensesB . It provides a more holistic view of the audited area.C . Its outcomes can be easily interpreted into audit: conclusions.D . Its application increases...
Which verification activity would best help the institution avoid falling victim to phishing?
A financial institution receives frequent and varied email requests from customers for funds to be wired out of their accounts. Which verification activity would best help the institution avoid falling victim to phishing?A . Reviewing the customer's wire activity to determine whether the request is typical.B . Calling the customer...
Which of the following best explains the matching principle?
Which of the following best explains the matching principle?A . Revenues should be recognized when earned.B . Revenue recognition is matched with cash.C . Expense recognition is tied to revenue recognition.D . Expenses are recognized at each accounting period.View AnswerAnswer: C
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?
Which of the following financial statements provides the best disclosure of how a company's money was used during a particular period?A . Income statement.B . Owner's equity statement.C . Balance sheet.D . Statement of cash flows.View AnswerAnswer: D
Which of the following would be classified as IT general controls?
Which of the following would be classified as IT general controls?A . Error listings.B . Distribution controls.C . Transaction logging.D . Systems development controls.View AnswerAnswer: D